Analysis

  • max time kernel
    87s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    22-10-2021 15:02

General

  • Target

    32d1507a7c046409634c823d251020502e6d7be05b4dea69d6a977a03e54364f.exe

  • Size

    1.2MB

  • MD5

    8407c5f1cd726391cd6cd26d49ee90b1

  • SHA1

    09740f964d998da73c0a26ed463d9063bee282c6

  • SHA256

    32d1507a7c046409634c823d251020502e6d7be05b4dea69d6a977a03e54364f

  • SHA512

    cd85597e1f3eb942ccb28d03258c5233259b05fc300d842173988ef10733d52eb3ee39417ea4a758c0febc842094247059b37e5d09529256a6716d15e376d16c

Malware Config

Extracted

Family

danabot

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Extracted

Family

danabot

Version

2052

Botnet

4

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    main

rsa_privkey.plain
rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot Loader Component 6 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 41 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32d1507a7c046409634c823d251020502e6d7be05b4dea69d6a977a03e54364f.exe
    "C:\Users\Admin\AppData\Local\Temp\32d1507a7c046409634c823d251020502e6d7be05b4dea69d6a977a03e54364f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\32D150~1.DLL,s C:\Users\Admin\AppData\Local\Temp\32D150~1.EXE
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Windows\SysWOW64\RUNDLL32.EXE
        C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\32D150~1.DLL,EA0DcThiNjRV
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\32D150~1.DLL
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2208
        • C:\Windows\SysWOW64\RUNDLL32.EXE
          C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\32D150~1.DLL,g0k5VA==
          4⤵
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious use of WriteProcessMemory
          PID:956
          • C:\Windows\system32\rundll32.exe
            C:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 19638
            5⤵
              PID:2252
              • C:\Windows\system32\ctfmon.exe
                ctfmon.exe
                6⤵
                  PID:936
            • C:\Windows\SysWOW64\RUNDLL32.EXE
              C:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll,Start
              4⤵
                PID:2076
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpB61.tmp.ps1"
                4⤵
                  PID:3184
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp6460.tmp.ps1"
                  4⤵
                    PID:3640
                    • C:\Windows\SysWOW64\nslookup.exe
                      "C:\Windows\system32\nslookup.exe" -type=any localhost
                      5⤵
                        PID:2088
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                      4⤵
                        PID:3456
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                        4⤵
                          PID:2740
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 792
                        3⤵
                        • Suspicious use of NtCreateProcessExOtherParentProcess
                        • Program crash
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1372
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 556
                      2⤵
                      • Suspicious use of NtCreateProcessExOtherParentProcess
                      • Program crash
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2820

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\PROGRA~3\zohplghndapsm.tmp

                    MD5

                    9d5ba503bcec6abf3f8d8ff108649876

                    SHA1

                    c74604be65ae5092b6ccffa84365e4449a43dee3

                    SHA256

                    3a47bacc324c8db90937665906b68813fcb52bd7b607cfb9075e3f861934648f

                    SHA512

                    c6c3bb377de52521ec3e8ce28b70562f56f80896b3cdd6f86569de26cc71e2d7b5dd86cdec0b486173abe76ce53d5981f43bb48992ddf8295bc31126c51608ff

                  • C:\PROGRA~3\zohplghndapsm.tmp

                    MD5

                    9d5ba503bcec6abf3f8d8ff108649876

                    SHA1

                    c74604be65ae5092b6ccffa84365e4449a43dee3

                    SHA256

                    3a47bacc324c8db90937665906b68813fcb52bd7b607cfb9075e3f861934648f

                    SHA512

                    c6c3bb377de52521ec3e8ce28b70562f56f80896b3cdd6f86569de26cc71e2d7b5dd86cdec0b486173abe76ce53d5981f43bb48992ddf8295bc31126c51608ff

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                    MD5

                    f7a808b5711f58fb4f85476c1bb24ac3

                    SHA1

                    fbdf9670d622e8fc3446ad4f53fbbd83016f03d1

                    SHA256

                    de4aadfe00c4cf41434a12450cdc69d37cb2d9cec951b074c3b5e7bfce9e94ec

                    SHA512

                    866848d13e999e6a1a79d77c33adb642d78d0a11adee293fca411b4ed5f7bf85324f90b3031148a66ac10dccc577d3c2a7c1ab6ed4237360de9911c27516a5af

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    MD5

                    2f1043d27291f1a6169f87362352bc01

                    SHA1

                    af2d9bbc07eef427cb15ebd9070e0ad754b100cf

                    SHA256

                    e5f371658be9d9f65188786fdbaa316f685090403058ec7e77b89d071913cd30

                    SHA512

                    b090c8d86e185a38a47421fcb40887928675d42c50063c1bfba935f7b9f8cab9dca753419374eef04496e1e20cba90506d3bd13b0022ce4f8aba0955432e3482

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    MD5

                    fd69f80f317d152796ff8da36775ffd8

                    SHA1

                    2bbe44a987914fa18a9e19c0df38e498e19163fc

                    SHA256

                    6aa6407b87d3f35aaa7fe538d64ac9a9df8d88e0f1ebd018f86ecc2c4dc2d592

                    SHA512

                    d93c870ac7d794ddf752fc497a78b8e441739e8cce8d92f17ae190d4c5402314b77b970360f28c845d56565f90e253152c239fb6972acc977f2139b9275f9566

                  • C:\Users\Admin\AppData\Local\Temp\32D150~1.DLL

                    MD5

                    309f711ceb0f5fbf2a8638ce99016846

                    SHA1

                    888e8fb77b8ed291ad349edca567822be1d1d8ce

                    SHA256

                    638c176cc47927a6afa4f2fcfc7c0d998ecb501e3ab24d07a24cbf53a31f7cc7

                    SHA512

                    ff93d220777d47b320ee5b6f543cdad7c2f9038aab8774f6075e3cd93b347d2cdb3c03e1246b9f6dde215706fe9cf3b79a10e324c369cf9e466d8cda486552bd

                  • C:\Users\Admin\AppData\Local\Temp\58cfb4a6.dll

                    MD5

                    5951f0afa96cda14623b4cce74d58cca

                    SHA1

                    ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

                    SHA256

                    8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

                    SHA512

                    b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

                  • C:\Users\Admin\AppData\Local\Temp\tmp6460.tmp.ps1

                    MD5

                    91cac20495335c754cbe98d2455942ec

                    SHA1

                    8bc9ab703b0bec97ab4343cca2110a043a797ee3

                    SHA256

                    41e7c0381b73b3656cdd1bb20df1a5d0c54c57d8324dc6580c221777658c5154

                    SHA512

                    91b4eecab04b7281c0763cda18b4572e071a134643d253394d8437b01f9de916a2d83b98cc90a255fd356b27f3acb0cac7ff5683251cd7625b64b9da3deab3b5

                  • C:\Users\Admin\AppData\Local\Temp\tmp6461.tmp

                    MD5

                    1860260b2697808b80802352fe324782

                    SHA1

                    f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b

                    SHA256

                    0c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1

                    SHA512

                    d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f

                  • C:\Users\Admin\AppData\Local\Temp\tmpB61.tmp.ps1

                    MD5

                    9ac9519a08ac324434beae872c00dcbe

                    SHA1

                    78058362795c2d08484efaa5eec216723a02c33b

                    SHA256

                    770dcb29b29632556f83f6a9deb5c19327ddd2225266bfc44825bfd923bf0ec6

                    SHA512

                    a5f99a4e83083becb0271645224301aa485711ef443471923939a77d74aeed1a4f47ab02fe6392f14a2928b8e8264d23b683d5615cdd5e360f7d7edd88577eeb

                  • C:\Users\Admin\AppData\Local\Temp\tmpB62.tmp

                    MD5

                    c416c12d1b2b1da8c8655e393b544362

                    SHA1

                    fb1a43cd8e1c556c2d25f361f42a21293c29e447

                    SHA256

                    0600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046

                    SHA512

                    cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c

                  • \Users\Admin\AppData\Local\Temp\32D150~1.DLL

                    MD5

                    309f711ceb0f5fbf2a8638ce99016846

                    SHA1

                    888e8fb77b8ed291ad349edca567822be1d1d8ce

                    SHA256

                    638c176cc47927a6afa4f2fcfc7c0d998ecb501e3ab24d07a24cbf53a31f7cc7

                    SHA512

                    ff93d220777d47b320ee5b6f543cdad7c2f9038aab8774f6075e3cd93b347d2cdb3c03e1246b9f6dde215706fe9cf3b79a10e324c369cf9e466d8cda486552bd

                  • \Users\Admin\AppData\Local\Temp\32D150~1.DLL

                    MD5

                    309f711ceb0f5fbf2a8638ce99016846

                    SHA1

                    888e8fb77b8ed291ad349edca567822be1d1d8ce

                    SHA256

                    638c176cc47927a6afa4f2fcfc7c0d998ecb501e3ab24d07a24cbf53a31f7cc7

                    SHA512

                    ff93d220777d47b320ee5b6f543cdad7c2f9038aab8774f6075e3cd93b347d2cdb3c03e1246b9f6dde215706fe9cf3b79a10e324c369cf9e466d8cda486552bd

                  • \Users\Admin\AppData\Local\Temp\32D150~1.DLL

                    MD5

                    309f711ceb0f5fbf2a8638ce99016846

                    SHA1

                    888e8fb77b8ed291ad349edca567822be1d1d8ce

                    SHA256

                    638c176cc47927a6afa4f2fcfc7c0d998ecb501e3ab24d07a24cbf53a31f7cc7

                    SHA512

                    ff93d220777d47b320ee5b6f543cdad7c2f9038aab8774f6075e3cd93b347d2cdb3c03e1246b9f6dde215706fe9cf3b79a10e324c369cf9e466d8cda486552bd

                  • \Users\Admin\AppData\Local\Temp\32D150~1.DLL

                    MD5

                    309f711ceb0f5fbf2a8638ce99016846

                    SHA1

                    888e8fb77b8ed291ad349edca567822be1d1d8ce

                    SHA256

                    638c176cc47927a6afa4f2fcfc7c0d998ecb501e3ab24d07a24cbf53a31f7cc7

                    SHA512

                    ff93d220777d47b320ee5b6f543cdad7c2f9038aab8774f6075e3cd93b347d2cdb3c03e1246b9f6dde215706fe9cf3b79a10e324c369cf9e466d8cda486552bd

                  • \Users\Admin\AppData\Local\Temp\58cfb4a6.dll

                    MD5

                    5951f0afa96cda14623b4cce74d58cca

                    SHA1

                    ad4a21bd28a3065037b1ea40fab4d7c4d7549fde

                    SHA256

                    8b64b8bfd9e36cc40c273deccd4301a6c2ab44df03b976530c1bc517d7220bce

                    SHA512

                    b098f302ad3446edafa5d9914f4697cbf7731b7c2ae31bc513de532115d7c672bec17e810d153eb0dbaae5b5782c1ac55351377231f7aa6502a3d9c223d55071

                  • memory/936-162-0x0000000000000000-mapping.dmp

                  • memory/956-129-0x0000000000000000-mapping.dmp

                  • memory/956-139-0x00000000057C0000-0x00000000057C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/956-147-0x0000000005670000-0x00000000057B0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/956-148-0x0000000005670000-0x00000000057B0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/956-153-0x0000000005670000-0x00000000057B0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/956-136-0x0000000004681000-0x0000000005665000-memory.dmp

                    Filesize

                    15.9MB

                  • memory/956-152-0x0000000005670000-0x00000000057B0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/956-132-0x00000000040E0000-0x0000000004244000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/956-140-0x00000000023B0000-0x00000000023B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/956-141-0x0000000005670000-0x00000000057B0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/956-142-0x0000000005670000-0x00000000057B0000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/956-151-0x00000000023C0000-0x00000000023C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2076-150-0x0000000000000000-mapping.dmp

                  • memory/2088-448-0x0000000000000000-mapping.dmp

                  • memory/2208-149-0x0000000007FC0000-0x0000000007FC1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-160-0x0000000008030000-0x0000000008031000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-143-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-146-0x0000000004DC2000-0x0000000004DC3000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-138-0x0000000007990000-0x0000000007991000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-137-0x0000000004E40000-0x0000000004E41000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-199-0x00000000095E0000-0x00000000095E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-198-0x000000007F130000-0x000000007F131000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-134-0x0000000004D10000-0x0000000004D11000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-169-0x00000000080A0000-0x00000000080A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-191-0x0000000009720000-0x0000000009753000-memory.dmp

                    Filesize

                    204KB

                  • memory/2208-179-0x0000000004D10000-0x0000000004D11000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-135-0x0000000004D10000-0x0000000004D11000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-161-0x0000000008270000-0x0000000008271000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-128-0x0000000000000000-mapping.dmp

                  • memory/2208-207-0x0000000004DC3000-0x0000000004DC4000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-174-0x00000000089A0000-0x00000000089A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-144-0x00000000077A0000-0x00000000077A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2208-166-0x0000000007940000-0x0000000007941000-memory.dmp

                    Filesize

                    4KB

                  • memory/2252-163-0x0000000000630000-0x00000000007D0000-memory.dmp

                    Filesize

                    1.6MB

                  • memory/2252-164-0x0000020CB4A30000-0x0000020CB4BE2000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2252-158-0x0000020CB47B0000-0x0000020CB47B2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2252-159-0x0000020CB47B0000-0x0000020CB47B2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2252-154-0x00007FF60EED5FD0-mapping.dmp

                  • memory/2736-123-0x0000000000000000-mapping.dmp

                  • memory/2736-127-0x0000000000570000-0x0000000000571000-memory.dmp

                    Filesize

                    4KB

                  • memory/2736-126-0x00000000052B1000-0x0000000006295000-memory.dmp

                    Filesize

                    15.9MB

                  • memory/2740-453-0x0000000000000000-mapping.dmp

                  • memory/2764-117-0x0000000000400000-0x0000000000966000-memory.dmp

                    Filesize

                    5.4MB

                  • memory/2764-116-0x0000000001000000-0x0000000001107000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/2764-115-0x0000000000E63000-0x0000000000F53000-memory.dmp

                    Filesize

                    960KB

                  • memory/3184-173-0x0000000004442000-0x0000000004443000-memory.dmp

                    Filesize

                    4KB

                  • memory/3184-167-0x0000000002B30000-0x0000000002B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/3184-188-0x0000000007CA0000-0x0000000007CA1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3184-263-0x0000000004443000-0x0000000004444000-memory.dmp

                    Filesize

                    4KB

                  • memory/3184-165-0x0000000000000000-mapping.dmp

                  • memory/3184-172-0x0000000004440000-0x0000000004441000-memory.dmp

                    Filesize

                    4KB

                  • memory/3184-168-0x0000000002B30000-0x0000000002B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/3184-202-0x0000000002B30000-0x0000000002B31000-memory.dmp

                    Filesize

                    4KB

                  • memory/3456-452-0x0000000000000000-mapping.dmp

                  • memory/3640-376-0x00000000046E0000-0x00000000046E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3640-451-0x00000000046E3000-0x00000000046E4000-memory.dmp

                    Filesize

                    4KB

                  • memory/3640-379-0x00000000046E2000-0x00000000046E3000-memory.dmp

                    Filesize

                    4KB

                  • memory/3640-351-0x0000000000000000-mapping.dmp

                  • memory/3936-118-0x0000000000000000-mapping.dmp

                  • memory/3936-121-0x0000000004CC1000-0x0000000005CA5000-memory.dmp

                    Filesize

                    15.9MB

                  • memory/3936-122-0x0000000000570000-0x0000000000571000-memory.dmp

                    Filesize

                    4KB